Yes you are probably right--but the code is so simple and I checked the
header sent with socketspy and it is the same size (208 bytes after
"Authorization: NTLM ") in both direct and non-direct! As I said it is just
a tunnel. Is there a way to decrypt the header with some ready tool? I do
not want to waste time with complex ntlm code with as you suggested. But
will look into structures now....

Regards,

SZ


On 3/15/08, Arno Garrels <[EMAIL PROTECTED]> wrote:
>
> Fastream Technologies wrote:
> > When I trace the code, it seems that your web server side NTLM code
> > is not called at all.
>
> So, that is your implementation! If you do not call my code it
> can hardly be the reason for the problem.
>
> > It just tunnels the www-authenticate headers
> > to/from the web server.
>
> It's your application that is tunneling.
>
> > Can you suggest me some URLs so that I can
> > read and understand what the eath is wrong with NTLM handshake?
>
> http://davenport.sourceforge.net/ntlm.html
>
> > You
> > told me all is well in one of your first mails. However, there must
> > be something wrong. For example, is the domain info embedded in the
> > hashed ntlm handshake?
>
> If you ever want to know exactly what is included in the NTLM messages
> you need to write a parser, basic info from NTLM message type 2 can be
> viewed with a function from Francois' unit OverbyteIcsNtlmMsgs.pas,
> it also includes the structures and shows how to parse NTLM messages.
>
> --
> Arno Garrels
>
>
> --
> To unsubscribe or change your settings for TWSocket mailing list
> please goto http://lists.elists.org/cgi-bin/mailman/listinfo/twsocket
> Visit our website at http://www.overbyte.be
>
-- 
To unsubscribe or change your settings for TWSocket mailing list
please goto http://lists.elists.org/cgi-bin/mailman/listinfo/twsocket
Visit our website at http://www.overbyte.be

Reply via email to